Posted on Feb 10, 2020
We have ALL been checking ALL the boxes that say we agree to privacy policies as they apply to our personal information, whether it be mobile phone contracts, applications like Facebook and other social media, and our vehicles. Wait – a privacy policy for our vehicles? When you plug in or connect your mobile device via Bluetooth a flood of information is downloaded and sent back to the car manufacturer over a continuously-on Internet connection. Car companies also send information to your vehicle, to fix bugs and add features. With 5G cellular networks being added all around the country, the amount of data moving to and from your vehicle is likely to increase. The difference between checking boxes for your smartphone, Nest or Alexa is that you KNOW those items are collecting data, but you likely didn’t realize that your car is also.
How much could your car possibly know about you? Turns out: quite a bit.
Read More »
Posted on Nov 1, 2019
Chances are you are considering an increase in your IT and security budget for 2020- and you are in good company.
Read More »
Posted on Sep 9, 2019
You are ready to invest in outsourced managed services to keep an eye on your network and secure your business: what are some of the questions your should be asking when you interview a potential partner?
Read More »
Posted on Jul 9, 2019
There are many scenarios that menace business executives in the restless pre-sleep: security breaches, wondering if their company’s credentials are for sale on the dark web, worrying over the impact of impending volatile weather, concerns over a dissatisfied or malicious employee, anxiety over old or failing equipment and the budget to replace them, the loss of a key employee.
Read More »
Posted on Jun 9, 2019
If your company owns or leases a digital copier, or “smart” machines to do your copying, scanning, printing, faxing or even emailing, you have an area in your office that is a significant cyber target.
Read More »
Posted on Feb 8, 2019
*Also published on i-95 Business
For everyday users of the world wide web, the Dark and Deep Web are shrouded in mystery. Let us bring greater light to its usefulness to you. For the purpose of this article we will focus mainly on the “Dark Web.” Perhaps you have pictured young hackers wearing the eponymous Anonymous mask. Many wonder what exactly can be found on the Dark Web but are a little leery of delving into the shade of the unknown – guilty by association of some morally questionable activities. The Dark Web is infamous as the domain of dubious individuals conducting unscrupulous business, sharing illicit content and anarchist theologies.
Read More »